Skip to main content
Top
Published in: Soft Computing 18/2018

12-06-2017 | Methodologies and Application

A trajectory privacy-preserving scheme based on query exchange in mobile social networks

Authors: Shaobo Zhang, Guojun Wang, Qin Liu, Jemal H. Abawajy

Published in: Soft Computing | Issue 18/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increase in the number of active location-based service (LBS) users, protecting the privacy of user trajectory has become a significant concern. In this paper, we propose a deviation-based query exchange (DQE) scheme that obfuscates the users’ query point to mitigate trajectory disclosure in mobile social networks (MSNs). The user finds a best matching user (BMU) in an MSN to exchange queries when a query request is issued. The DQE scheme can prevent the attacker from reconstructing the user’s trajectory by collecting data from the LBS server which records only the user’s ID and his BMUs’ locations (fake locations). By virtue of the private matching algorithm based on the matrix confusion, the DQE scheme allows LBS users to enjoy the service while preserving their privacy. In order to test the effectiveness and efficiency of the proposed scheme, we carried out extensive security and performance analyses under various conditions. The results of the experiments show that the proposed DQE scheme can protect users’ trajectory privacy effectively and reduce the overhead of the LBS server.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Brinkhoff T (2003) Generating traffic data. Bull Tech Comm Data Eng IEEE Comput Soc 26:2003 Brinkhoff T (2003) Generating traffic data. Bull Tech Comm Data Eng IEEE Comput Soc 26:2003
go back to reference Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in spatial and temporal databases, international symposium, SSTD 2007, Boston, MA, USA. pp 258–275. 16–18 Jul 2007 Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in spatial and temporal databases, international symposium, SSTD 2007, Boston, MA, USA. pp 258–275. 16–18 Jul 2007
go back to reference Chow CY (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM international symposium on geographic information systems, ACM-Gis 2006, Arlington, VA, USA. pp 171–178. 10–11 Nov 2006 Chow CY (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM international symposium on geographic information systems, ACM-Gis 2006, Arlington, VA, USA. pp 171–178. 10–11 Nov 2006
go back to reference Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM, New york Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM, New york
go back to reference Dai J, Hua L (2015) A method for the trajectory privacy protection based on the segmented fake trajectory under road networks. In: International conference on information science and control engineering. pp 13–17 Dai J, Hua L (2015) A method for the trajectory privacy protection based on the segmented fake trajectory under road networks. In: International conference on information science and control engineering. pp 13–17
go back to reference Ficco M, Pietrantuono R, Russo S (2016) Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Comput 20(7):2641–2664CrossRef Ficco M, Pietrantuono R, Russo S (2016) Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Comput 20(7):2641–2664CrossRef
go back to reference Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef
go back to reference Gao S, Ma J, Shi W, Zhan G, Sun C (2013) TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRef Gao S, Ma J, Shi W, Zhan G, Sun C (2013) TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRef
go back to reference Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In International workshop on mobile location-based service. pp 71–78 Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In International workshop on mobile location-based service. pp 71–78
go back to reference Huo Z, Meng X, Hu H, Huang Y (2012) You can walk alone: trajectory privacy-preserving through significant stays protection. In: International conference on database systems for advanced applications. pp 351–366 Huo Z, Meng X, Hu H, Huang Y (2012) You can walk alone: trajectory privacy-preserving through significant stays protection. In: International conference on database systems for advanced applications. pp 351–366
go back to reference Hwang RH, Hsueh YL, Chung HW (2014) A novel time-obfuscated algorithm for trajectory privacy protection. In: International symposium on pervasive systems, algorithms and networks. pp 208–215 Hwang RH, Hsueh YL, Chung HW (2014) A novel time-obfuscated algorithm for trajectory privacy protection. In: International symposium on pervasive systems, algorithms and networks. pp 208–215
go back to reference Jin L, Palanisamy B, Joshi JBD (2014) Poster: compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: ACM SIGSAC conference on computer and communications security. pp 1439–1441 Jin L, Palanisamy B, Joshi JBD (2014) Poster: compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: ACM SIGSAC conference on computer and communications security. pp 1439–1441
go back to reference Kim HI, Kim YK, Chang JW (2013) A grid-based coaking area creation scheme for continuous LBS queries in distributed systems. JoC 4(1):23–30 Kim HI, Kim YK, Chang JW (2013) A grid-based coaking area creation scheme for continuous LBS queries in distributed systems. JoC 4(1):23–30
go back to reference Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comput Syst 63(C):56–75CrossRef Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comput Syst 63(C):56–75CrossRef
go back to reference Lei PR, Peng WC, Su J, Chang CP (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350MathSciNet Lei PR, Peng WC, Su J, Chang CP (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350MathSciNet
go back to reference Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233CrossRef Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233CrossRef
go back to reference Niu B , Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. pp 754–762 Niu B , Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. pp 754–762
go back to reference Niu B, Zhu X, Chi H, Li H (2013) 3plus: privacy-preserving pseudo-location updating system in location-based services. In: Wireless communications and networking conference. pp 4564–4569 Niu B, Zhu X, Chi H, Li H (2013) 3plus: privacy-preserving pseudo-location updating system in location-based services. In: Wireless communications and networking conference. pp 4564–4569
go back to reference Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508CrossRef Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508CrossRef
go back to reference Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRef Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRef
go back to reference Primault V, Boutet A, Mokhtar SB, Brunie L (2016) Adaptive location privacy with alp. In: The 35th symposium on reliable distributed systems, pp 269–278 Primault V, Boutet A, Mokhtar SB, Brunie L (2016) Adaptive location privacy with alp. In: The 35th symposium on reliable distributed systems, pp 269–278
go back to reference Sang Y, Shen H, Tian H, Zhang Z (2016) Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans Inf Forensics Secur 11(10):2187–2202CrossRef Sang Y, Shen H, Tian H, Zhang Z (2016) Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans Inf Forensics Secur 11(10):2187–2202CrossRef
go back to reference Schlegel R, Chow CY, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRef Schlegel R, Chow CY, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRef
go back to reference Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux JP (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secur Comput 11(3):266–279CrossRef Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux JP (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secur Comput 11(3):266–279CrossRef
go back to reference Sui X, Chen Z, Guo L, Kai W, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765–779CrossRef Sui X, Chen Z, Guo L, Kai W, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765–779CrossRef
go back to reference Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735–1747CrossRef Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735–1747CrossRef
go back to reference Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: International conference on mobile data management. pp 65–72 Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: International conference on mobile data management. pp 65–72
go back to reference Vu K, Zheng R, Gao J (2012) Efficient algorithms for k-anonymous location privacy in participatory sensing. Proc IEEE INFOCOM 131(5):2399–2407 Vu K, Zheng R, Gao J (2012) Efficient algorithms for k-anonymous location privacy in participatory sensing. Proc IEEE INFOCOM 131(5):2399–2407
go back to reference Wang G, Du Q, Zhou W, Liu Q (2013) A scalable encryption scheme for multi-privileged group communications. J Supercomput 64(3):1075–1091CrossRef Wang G, Du Q, Zhou W, Liu Q (2013) A scalable encryption scheme for multi-privileged group communications. J Supercomput 64(3):1075–1091CrossRef
go back to reference Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans Netw 99:1–1 Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans Netw 99:1–1
go back to reference Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) Cenlocshare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst. doi:10.1016/j.future.2017.01.035 Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) Cenlocshare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst. doi:10.​1016/​j.​future.​2017.​01.​035
go back to reference Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRef Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRef
go back to reference Zhang S, Liu Q, Wang G (2015) Deviation-based location switching protocol for trajectory privacy protection. Springer, BerlinCrossRef Zhang S, Liu Q, Wang G (2015) Deviation-based location switching protocol for trajectory privacy protection. Springer, BerlinCrossRef
go back to reference Zhu X, Liu J, Jiang S, Chen Z (2014) Efficient weight-based private matching for proximity-based mobile social networks. In: IEEE international conference on communications. pp 4114–4119 Zhu X, Liu J, Jiang S, Chen Z (2014) Efficient weight-based private matching for proximity-based mobile social networks. In: IEEE international conference on communications. pp 4114–4119
Metadata
Title
A trajectory privacy-preserving scheme based on query exchange in mobile social networks
Authors
Shaobo Zhang
Guojun Wang
Qin Liu
Jemal H. Abawajy
Publication date
12-06-2017
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 18/2018
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2676-6

Other articles of this Issue 18/2018

Soft Computing 18/2018 Go to the issue

Premium Partner